Security association storage and recovery in group key management

a technology of group key management and security association, applied in the security field, can solve the problems of reducing the performance of multicast applications, sa, data sa, etc., and achieve the effect of minimizing the performance loss of re-establishing the secure group

Inactive Publication Date: 2008-07-01
RPX CLEARINGHOUSE
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]According to one aspect of the invention, a method for preserving security associations between at least two entities includes the steps of maintaining a security association relating to communication between the at least two entities in a table, and periodically storing the security association in non-volatile storage. With such an arrangement, in...

Problems solved by technology

One problem with the GCKS is that, in the event of a power failure or system re-boot, the registration SA, data SAs and other keying information for each member of the g...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security association storage and recovery in group key management
  • Security association storage and recovery in group key management
  • Security association storage and recovery in group key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011]FIG. 1 illustrates a system 20 illustrating a number of members 22 and 24 coupled to a server 30 via a communications network 29. The system of FIG. 1 is a generic system, and the members may be any type of device that is capable of receiving controlled data content, including a television, computer, wire-less device, etc. Thus, the network 29 may be any type of network, whether it is cable based, ISDN based, wireless or some combination thereof operating according to any communication protocol. Exemplary members include, for example, members of a private computer network who share a private network, or a cable consumers who receive content via a pre-paid service arrangement, such as pay-per-view, etc.

[0012]The server 30 is shown to include a Group Controller / Key Server (GCKS) 31 and storage 35. The server 30 that includes the GCKS 31 functionality is illustrated as a distinct entity. However, the present invention is not limited to any particular implementation or placement o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for preserving security associations between at least two entities includes the steps of maintaining a security association relating to communication between the at least two entities in a table, and periodically storing the security association in non-volatile storage. With such an arrangement, in the event that data within the table become corrupted, it can be retrieved from storage. Because the key data is stored, performance losses due to re-establishing the secure group are minimized. In one embodiment, the security association is advantageously encrypted prior to storage to further secure the security associations for each member.

Description

FIELD OF THE INVENTION[0001]This invention relates generally to the field of security and more particularly to a method and apparatus for maintaining key associations between a pair of entities.BACKGROUND OF THE INVENTION[0002]Exemplary multicast applications, such as video broadcast or multicast file transfer, transfer content to a defined secure group. A secure group is a collection of members who may be senders, receivers, or both senders and receivers of content. Group key management protocols ensure that only members of a secure group can gain access to group data and can authenticate group data by providing legitimate group members with the up-to-date cryptographic state that they need for their secrecy and authenticity requirements.[0003]According to the group key management protocol, group members receive security associations (SAs). A Security Association (SA) is a set of policy and cryptographic keys that provide security services to network traffic that matches that polic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
CPCH04L9/0833H04L9/0891H04L9/0894H04L2209/60
Inventor DONDETI, LAKSHMINATHLEE, MICHAELHORSFALL, FRANK
Owner RPX CLEARINGHOUSE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products